0

testing Online Quiz - 48

Description: testing Online Quiz - 48
Number of Questions: 20
Created by:
Tags: testing
Attempted 0/20 Correct 0 Score 0

Condition Testing is a control structure Testing Technique where the criteria used to design test cases is that they

  1. Rely on Path Based Testing

  2. Exercise the Logical Conditions in a Program module

  3. Select Test Paths based on the locations and uses of variables

  4. Focus on Testing the Validity of loop constructs


Correct Option: B

Data Flow Testing is a control structure Testing Technique where the criteria used to design test cases is that they

  1. Rely on Path Based Testing

  2. Exercise the Logical Conditions in a Program module

  3. Select Test Paths based on the locations and uses of variables

  4. Focus on Testing the Validity of loop constructs


Correct Option: C

Black-Box Testing attempts to find errors in which of the following categories

  1. Incorrect or Missing functions

  2. Interface Errors

  3. Performance Errors

  4. All of the Above

  5. None of the Above


Correct Option: D

Fault-based Testing is best reserved for

  1. Conventional Software Testing

  2. Operations and classes that are Critical or Suspect

  3. Use-Case Validation

  4. White-Box Testing of Operator Algorithms


Correct Option: B

The Test data is divided into valid and invalid classes. Then those two classes are tested. This is

  1. Boundary Value Analysis

  2. Error Guessing

  3. Equivalence Partitioning

  4. Both B and C


Correct Option: C

Which of the following are characteristics of testable Software ?

  1. Observability

  2. Simplicity

  3. Stability

  4. All of the Above


Correct Option: D

Which testing ensures that all part of the code is executed once?

  1. Statement Coverage

  2. Path Coverage

  3. Branch Coverage

  4. None of the Above


Correct Option: A

Select the options which ensure application’s Security (select more than one)

  1. Authentication

  2. Authorization

  3. Integrity

  4. Availability

  5. Confidentiality


Correct Option: A,B,C,D,E

Custom error message display should be turned ‘On’ to reduce attacks

  1. True

  2. False


Correct Option: B

Key words used for SQL Injection attack (select more than one)

  1. CREATE

  2. UNION

  3. WHERE

  4. OR


Correct Option: B,D

Select the application type which could be affected by security threats (select more than one)

  1. Website with URL https

  2. Website with URL http

  3. Windows application

  4. Only Website with URL http & Windows application


Correct Option: A,B,C

Select input validation threat category (select more than one)

  1. Buffer overflows

  2. SQL Injection

  3. Cross site scripting

  4. Authentication

  5. Authorization


Correct Option: A,B,C

Client side validation is advised for enforcing the security

  1. True

  2. False


Correct Option: B

Select the validations required for File upload (Select more than one)

  1. File Name

  2. File Type

  3. Size

  4. Virus Scanning


Correct Option: B,C,D

Cross Site scripting threat would be possible if the user input is echoed back to the user

  1. True

  2. False


Correct Option: B

Common threats in the application / system

  1. Denial of service

  2. Executing malicious content

  3. Information disclosure

  4. All of the above


Correct Option: D
  1. Windows authentication

  2. SQL authentication

  3. Form based authentication

  4. Basic authentication

  5. Passport authentication

  6. All of the above


Correct Option: A,C,D,E

Select the one which would lead to SQL injection attack

  1. SqlDataAdapter myCommand = new SqlDataAdapter( "SELECT CustomerName, Email, PhoneNo FROM users WHERE cust_id = '" + txtuser.Text + "'", myConnection);

  2. CREATE PROCEDURE procGetUser @custId VARCHAR(5) AS SELECT CustomerName, Email, PhoneNo FROM Customers WHERE cust_id = @custId

  3. SqlDataAdapter myDataAdapter = new SqlDataAdapter("SELECT CustomerName, Email, PhoneNo FROM Customers WHERE cust_id = @cust_id", connection); myCommand.SelectCommand.Parameters.Add("@cust_id", SqlDbType.VarChar,

  4. All the above


Correct Option: A

Select the security best practice techniques (select more than one)

  1. Provide highest privilege

  2. Encode all client supplied data

  3. Use of parameterized stored procedure

  4. Providing detailed error message


Correct Option: B,C,D
- Hide questions